ethics and security€¦ · importance of ethics to security • information security professionals...

15
Ethics and Security ISSA International Ethics Committee V2.1 4/27/07

Upload: others

Post on 06-Nov-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ethics and Security€¦ · Importance of Ethics to Security • Information Security professionals are entrusted with the crown jewels of an organization. • Ethical behavior, both

Ethics and Security

ISSA International Ethics Committee

V2.1 4/27/07

Page 2: Ethics and Security€¦ · Importance of Ethics to Security • Information Security professionals are entrusted with the crown jewels of an organization. • Ethical behavior, both

Importance of Ethics to Security

• Information Security professionals are entrusted with the crown jewels of an organization.

• Ethical behavior, both on and off-the-job, is the assurance that we are worthy of that trust.

• IS Security sets and upholds a standard– Corporate Ethics programs originating from the CSO– Promote uniform adherence to policy through example

Presenter
Presentation Notes
IS Security Professionals possess significant control and access Good judgment and professional conduct is REQUIRED Lead by example – taking the high ground
Page 3: Ethics and Security€¦ · Importance of Ethics to Security • Information Security professionals are entrusted with the crown jewels of an organization. • Ethical behavior, both

Topics

• Ethics in the Information Security Realm

• ISSA International Ethics Posture

• ISSA International Ethics Committee

• Importance of Ethics To Security

• Responsibilities of Security Professionals

Page 4: Ethics and Security€¦ · Importance of Ethics to Security • Information Security professionals are entrusted with the crown jewels of an organization. • Ethical behavior, both

Ethics Overview

• Ethics is about how we ought to live*

• The purpose of Ethics in Information Security is not just philosophically important, it can mean the survival of a business or an industry**

Ethics is doing the right thing, even when no one is looking

Presenter
Presentation Notes
Discussion on positioning of Ethics – between legality and morality Relevance of Broad Statement - “Ethics is about the way we should conduct ourselves when providing our services within the IT Security profession”. Examples of ethical lapses leading to failure are too common * Singer, Peter. Ethics. New York: Oxford University Press, 1994. ** Northcutt, Stephen. IT Ethics Handbook. Rockland: Syngress, 2004.
Page 5: Ethics and Security€¦ · Importance of Ethics to Security • Information Security professionals are entrusted with the crown jewels of an organization. • Ethical behavior, both

ISSA International Code of Ethics (Part 1)

• Perform all professional activities and duties in accordance with all applicable laws and the highest ethical principles;

• Promote generally accepted information security current best practices and standards;

• Maintain appropriate confidentiality of proprietary or otherwise sensitive information encountered in the course of professional activities;

Page 6: Ethics and Security€¦ · Importance of Ethics to Security • Information Security professionals are entrusted with the crown jewels of an organization. • Ethical behavior, both

ISSA International Code of Ethics (Part 2)

• Discharge professional responsibilities with diligence and honesty;

• Refrain from any activities which might constitute a conflict of interest or otherwise damage the reputation of employers, the information security profession, or the Association; and

• Not intentionally injure or impugn the professional reputation or practice of colleagues, clients, or employers.

Page 7: Ethics and Security€¦ · Importance of Ethics to Security • Information Security professionals are entrusted with the crown jewels of an organization. • Ethical behavior, both

ISSA’s Posture –Ethics for the Security Professional

• Set Ethical Standards for Membership– Include Broader Audiences

• Educated and Informed Members– Case Studies, Articles, Courses

• Universally Applicable Standards– Geographically, Culturally– Cross Discipline

Presenter
Presentation Notes
Required Ethical Standard – Must be Agreed to for ISSA Membership Proactive promotion, awareness and education in Ethics for InfoSec Reflect global experiences, embrace convergence across disciplines
Page 8: Ethics and Security€¦ · Importance of Ethics to Security • Information Security professionals are entrusted with the crown jewels of an organization. • Ethical behavior, both

ISSA International Ethics Committee

• Founded in 2002• 15 active members• Purpose: Provide guidance on ethical

behavior for Information System Security professionals, develop and maintain guidelines for ethics relating to Information Security practices.

Proactive Promotion and Educationto Influence Positive Behavior

Presenter
Presentation Notes
Page 9: Ethics and Security€¦ · Importance of Ethics to Security • Information Security professionals are entrusted with the crown jewels of an organization. • Ethical behavior, both

Accomplishments• Approved policy by ISSA International Board

– Reporting and reviewing ethical complaints, appeals• Respond to and hear valid ethics complaints

– Time-sensitive– Confidential– Unbiased– Consistent analysis of facts and perspectives– Findings referred up to ISSA International Board

• New Disclosure of Relationships Process– Identify and mitigate potential Conflicts of Interest– Completed forms are reviewed and suggestions provided– ISSA International Board, ISSA Foundation, Ethics Committee

• Articles for ISSA Journal, Outreach and Education• Ad-hoc research

Presenter
Presentation Notes
Written policy for the ISSA Operations Manual Handle complaints and hear cases Time-sensitive – move rapidly to resolution, sometimes with mediation Confidential – Extremely sensitive information, legal ramifications Unbiased – recusing of members with potential bias Uniform and orderly analysis of facts and sifting the perspectives Recommendation referred up to ISSA International Board Educate ourselves and the general membership
Page 10: Ethics and Security€¦ · Importance of Ethics to Security • Information Security professionals are entrusted with the crown jewels of an organization. • Ethical behavior, both

ISSA Ethics Complaint Handling• Formal, Written Complaint is Received and Verified for Completeness

• Notices sent to both parties– Complete Complaint– Copy of Policy, Clear Description of Next Steps– Listing of Ethics Committee members (ability to recuse members – eliminate bias)

• Evaluation of Facts as Submitted by Both Parties– Some Clarification may be Requested – Mediation Assistance may be Requested

• Hearing Panel Assembled – Conference Call Scheduled– At least 3 members of the Committee (Voting)– A member of the ISSA International Board (Voting)– Include a current Chapter Officer (Voting)– Association Attorney (Non-Voting)

• Findings and Recommendation Sent to ISSA International Board

Presenter
Presentation Notes
IS Security Professionals possess significant control and access Good judgment and professional conduct is REQUIRED Lead by example – taking the high ground
Page 11: Ethics and Security€¦ · Importance of Ethics to Security • Information Security professionals are entrusted with the crown jewels of an organization. • Ethical behavior, both

Ethical Challenges in InfoSec

• Misrepresentation of certifications, skills• Abuse of privileges• Inappropriate monitoring• Withholding information • Divulging information inappropriately• Overstating issues• Conflicts of interest • Management / employee / client issues

Presenter
Presentation Notes
Audience involvement can be solicited
Page 12: Ethics and Security€¦ · Importance of Ethics to Security • Information Security professionals are entrusted with the crown jewels of an organization. • Ethical behavior, both

Ethical Challenges – Snake Oil• “Consultants" who profess to offer information security

consulting, but offer profoundly bad advice

• "Educators", both individuals and companies, that offer to teach information security, but provide misinformation (generally through ignorance, not intent)

• "Security Vendors", who oversell the security of their products

• "Analysts", who oversimplify security challenges, and try to upsell additional services to naïve clients

• "Legislators", who push through "from-the-hip" regulations, without thoughtful consideration of their long-term impact

Presenter
Presentation Notes
Audience involvement can be solicited
Page 13: Ethics and Security€¦ · Importance of Ethics to Security • Information Security professionals are entrusted with the crown jewels of an organization. • Ethical behavior, both

Some Resource Linkshttp://ethics.csc.ncsu.edu/

http://www.ethicsweb.ca/resources/

http://ethics.iit.edu/index.html

http://onlineethics.org/On the development of a personal code of ethics...

http://www.domain-b.com/management/general/20060401_personal.html

Corporate ethics training...

http://www.integrity-interactive.com/

http://www.easyi.com/enus/business-ethics/solutions.asp

On the role of ethics...

http://securityawareness.blogspot.com/2005/07/role-of-ethics-in-information-security_07.html

http://www.seifried.org/security/index.php/Closet20000531_Ethics_in_Information_Security

Something from the SANS Reading Room

http://www.sans.org/rr/whitepapers/legal/54.php

Page 14: Ethics and Security€¦ · Importance of Ethics to Security • Information Security professionals are entrusted with the crown jewels of an organization. • Ethical behavior, both

Ten Commandments of Ethics in Information SecurityThou shalt not use a computer to harm other people.

Thou shalt not interfere with other people's computer work.

Thou shalt not snoop around in other people's computer files.

Thou shalt not use a computer to steal.

Thou shalt not use a computer to bear false witness.

Thou shalt not copy or use proprietary software for which you have not paid.

Thou shalt not use other people's computer resources without authorization or proper compensation.

Thou shalt not appropriate other people's intellectual output.

Thou shalt think about the social consequences of the program you are writing or the system you are designing.

Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans.

-Courtesy of the Computer Ethics Institute, A project of the Brookings Institution

Page 15: Ethics and Security€¦ · Importance of Ethics to Security • Information Security professionals are entrusted with the crown jewels of an organization. • Ethical behavior, both

Questions/Discussion